Home
last modified time | relevance | path

Searched refs:app (Results 1 – 25 of 737) sorted by relevance

12345678910>>...30

/system/chre/platform/shared/
Dmemory_manager.cc24 void *MemoryManager::nanoappAlloc(Nanoapp *app, uint32_t bytes) { in nanoappAlloc() argument
30 app->getInstanceId()); in nanoappAlloc()
35 app->getInstanceId()); in nanoappAlloc()
38 doAlloc(app, sizeof(HeapBlockHeader) + bytes)); in nanoappAlloc()
41 app->setTotalAllocatedBytes(app->getTotalAllocatedBytes() + bytes); in nanoappAlloc()
47 app->linkHeapBlock(header); in nanoappAlloc()
49 header->data.instanceId = app->getInstanceId(); in nanoappAlloc()
57 void MemoryManager::nanoappFree(Nanoapp *app, void *ptr) { in nanoappFree() argument
65 if (app->getInstanceId() != header->data.instanceId) { in nanoappFree()
67 app->getInstanceId(), header->data.instanceId); in nanoappFree()
[all …]
/system/chre/test/simulation/
Dmemory_test.cc77 auto app = loadNanoapp<App>(); in TEST_F() local
81 Nanoapp *nanoapp = getNanoappByAppId(app.id); in TEST_F()
88 sendEventToNanoapp(app, ALLOCATE, 100); in TEST_F()
96 sendEventToNanoapp(app, ALLOCATE, 200); in TEST_F()
103 sendEventToNanoapp(app, FREE, ptr1); in TEST_F()
109 sendEventToNanoapp(app, FREE, ptr2); in TEST_F()
138 auto app = loadNanoapp<App>(); in TEST_F() local
142 Nanoapp *nanoapp = getNanoappByAppId(app.id); in TEST_F()
149 sendEventToNanoapp(app, ALLOCATE, 100); in TEST_F()
157 sendEventToNanoapp(app, ALLOCATE, 200); in TEST_F()
[all …]
Dble_test.cc72 auto app = loadNanoapp<App>(); in TEST_F() local
75 sendEventToNanoapp(app, GET_CAPABILITIES); in TEST_F()
81 sendEventToNanoapp(app, GET_FILTER_CAPABILITIES); in TEST_F()
156 auto app = loadNanoapp<App>(); in TEST_F() local
159 sendEventToNanoapp(app, START_SCAN); in TEST_F()
166 sendEventToNanoapp(app, STOP_SCAN); in TEST_F()
206 auto app = loadNanoapp<App>(); in TEST_F() local
209 sendEventToNanoapp(app, START_SCAN); in TEST_F()
215 unloadNanoapp(app); in TEST_F()
272 auto app = loadNanoapp<App>(); in TEST_F() local
[all …]
Dtimer_test.cc88 auto app = loadNanoapp<App>(); in TEST_F() local
96 .findNanoappInstanceIdByAppId(app.id, &instanceId)); in TEST_F()
99 sendEventToNanoapp(app, START_TIMER); in TEST_F()
109 sendEventToNanoapp(app, STOP_TIMER, handle); in TEST_F()
115 sendEventToNanoapp(app, STOP_TIMER, handle); in TEST_F()
156 auto app = loadNanoapp<App>(); in TEST_F() local
164 .findNanoappInstanceIdByAppId(app.id, &instanceId)); in TEST_F()
167 sendEventToNanoapp(app, START_TIMER); in TEST_F()
174 unloadNanoapp(app); in TEST_F()
Dwifi_timeout_test.cc84 auto app = loadNanoapp<App>(); in TEST_F() local
88 sendEventToNanoapp(app, SCAN_REQUEST, timeOutCookie); in TEST_F()
102 sendEventToNanoapp(app, SCAN_REQUEST, successCookie); in TEST_F()
107 unloadNanoapp(app); in TEST_F()
153 auto app = loadNanoapp<App>(); in TEST_F() local
157 sendEventToNanoapp(app, SCAN_MONITOR_REQUEST, timeoutRequest); in TEST_F()
172 sendEventToNanoapp(app, SCAN_MONITOR_REQUEST, enableRequest); in TEST_F()
182 sendEventToNanoapp(app, SCAN_MONITOR_REQUEST, disableRequest); in TEST_F()
190 unloadNanoapp(app); in TEST_F()
252 auto app = loadNanoapp<App>(); in TEST_F() local
[all …]
Dwifi_test.cc79 auto app = loadNanoapp<App>(); in TEST_F() local
83 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F()
90 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F()
142 auto app = loadNanoapp<App>(); in TEST_F() local
146 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F()
155 unloadNanoapp(app); in TEST_F()
202 auto app = loadNanoapp<App>(); in TEST_F() local
206 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F()
215 unloadNanoapp(app); in TEST_F()
218 app = loadNanoapp<App>(); in TEST_F()
[all …]
Dgnss_test.cc124 auto app = loadNanoapp<App>(); in TEST_F() local
130 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F()
158 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F()
218 auto app = loadNanoapp<App>(); in TEST_F() local
223 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F()
232 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F()
286 auto app = loadNanoapp<App>(); in TEST_F() local
290 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F()
299 unloadNanoapp(app); in TEST_F()
353 auto app = loadNanoapp<App>(); in TEST_F() local
[all …]
/system/chre/core/tests/
Dmemory_manager_test.cc39 Nanoapp app; in TEST() local
40 void *ptr = manager.nanoappAlloc(&app, 1u); in TEST()
44 manager.nanoappFree(&app, ptr); in TEST()
51 Nanoapp app; in TEST() local
52 manager.nanoappFree(&app, nullptr); in TEST()
59 Nanoapp app; in TEST() local
60 void *ptr = manager.nanoappAlloc(&app, 0u); in TEST()
68 Nanoapp app; in TEST() local
69 void *ptr = manager.nanoappAlloc(&app, manager.getMaxAllocationBytes() + 1); in TEST()
76 Nanoapp app; in TEST() local
[all …]
/system/linkerconfig/testdata/golden_output/stage0/
Dld.config.txt12 dir.system = /product/app/
24 namespace.default.permitted.paths += /system/app
25 namespace.default.permitted.paths += /system/priv-app
27 namespace.default.permitted.paths += /system_ext/app
28 namespace.default.permitted.paths += /system_ext/priv-app
30 namespace.default.permitted.paths += /vendor/app
31 namespace.default.permitted.paths += /vendor/priv-app
33 namespace.default.permitted.paths += /system/vendor/app
34 namespace.default.permitted.paths += /system/vendor/priv-app
36 namespace.default.permitted.paths += /odm/app
[all …]
/system/chre/test/simulation/inc/
Dtest_util.h93 Nanoapp app; in loadNanoapp() local
94 loadNanoapp(app.name, app.id, app.version, app.perms, app.start, in loadNanoapp()
95 app.handleEvent, app.end); in loadNanoapp()
97 return app; in loadNanoapp()
108 void unloadNanoapp(Nanoapp app) { in unloadNanoapp() argument
110 unloadNanoapp(app.id); in unloadNanoapp()
183 void sendEventToNanoapp(const Nanoapp &app, uint16_t eventType) { in sendEventToNanoapp() argument
188 .findNanoappInstanceIdByAppId(app.id, &instanceId)) { in sendEventToNanoapp()
197 LOGE("No instance found for nanoapp id = 0x%016" PRIx64, app.id); in sendEventToNanoapp()
216 void sendEventToNanoapp(const Nanoapp &app, uint16_t eventType, in sendEventToNanoapp() argument
[all …]
/system/extras/tests/workloads/
Dsystemapps.sh156 for app in $appList
158 vout Starting $app...
162 resetJankyFrames $(getPackageName $app)
164 tmpTraceOut="$tmpTraceOutBase-$app.out"
166 startInstramentation "$app-$cur"
169 startInstramentation "$app-$cur" 0
176 t=$(startActivity $app)
178 t=$(forceStartActivity $app)
183 set -- $(getJankyFrames $(getPackageName $app))
213 …printf "%-10s %5.0f %5.0f %4.0f(%2.0f%%) %2.0f/%2.0f/%2.0f\n" $app $t $diffTime $janks $jankP…
[all …]
/system/chre/core/
Devent_loop.cc64 bool populateNanoappInfo(const Nanoapp *app, struct chreNanoappInfo *info) { in populateNanoappInfo() argument
67 if (app != nullptr && info != nullptr) { in populateNanoappInfo()
68 info->appId = app->getAppId(); in populateNanoappInfo()
69 info->version = app->getAppVersion(); in populateNanoappInfo()
70 info->instanceId = app->getInstanceId(); in populateNanoappInfo()
71 if (app->getTargetApiVersion() >= CHRE_API_VERSION_1_8) { in populateNanoappInfo()
72 CHRE_ASSERT(app->getRpcServices().size() <= Nanoapp::kMaxRpcServices); in populateNanoappInfo()
74 static_cast<uint8_t>(app->getRpcServices().size()); in populateNanoappInfo()
75 info->rpcServices = app->getRpcServices().data(); in populateNanoappInfo()
106 for (const UniquePtr<Nanoapp> &app : mNanoapps) { in findNanoappInstanceIdByAppId() local
[all …]
/system/linkerconfig/testdata/golden_output/stage1/com.android.runtime/
Dld.config.txt97 namespace.system.permitted.paths += /system/app
98 namespace.system.permitted.paths += /system/priv-app
100 namespace.system.permitted.paths += /system_ext/app
101 namespace.system.permitted.paths += /system_ext/priv-app
103 namespace.system.permitted.paths += /vendor/app
104 namespace.system.permitted.paths += /vendor/priv-app
106 namespace.system.permitted.paths += /system/vendor/app
107 namespace.system.permitted.paths += /system/vendor/priv-app
109 namespace.system.permitted.paths += /odm/app
110 namespace.system.permitted.paths += /odm/priv-app
[all …]
/system/linkerconfig/testdata/golden_output/stage1/com.android.art/
Dld.config.txt100 namespace.system.permitted.paths += /system/app
101 namespace.system.permitted.paths += /system/priv-app
103 namespace.system.permitted.paths += /system_ext/app
104 namespace.system.permitted.paths += /system_ext/priv-app
106 namespace.system.permitted.paths += /vendor/app
107 namespace.system.permitted.paths += /vendor/priv-app
109 namespace.system.permitted.paths += /system/vendor/app
110 namespace.system.permitted.paths += /system/vendor/priv-app
112 namespace.system.permitted.paths += /odm/app
113 namespace.system.permitted.paths += /odm/priv-app
[all …]
/system/extras/memory_replay/traces/
DTRACES7 Trace of the native camera app from start-up.
10 Trace of the Google Gmail app from start-up and through reading messages.
13 Trace of the Google Maps app from start-up while looking at various parts
17 Trace of the system app process surfaceflinger from start-up while
21 Trace of the system app process system_server from start-up while
25 Trace of the system app process systemui from start-up while
29 Trace of the Google YouTube app from start-up and while watching various
40 Why: Top 500 app using Unity engine.
42 Complete the tutorial. Restart the app with tracing enabled and play
53 Play first level. Restart the app with tracing enabled and play a few
[all …]
/system/tools/aidl/
Dhiddenapi-greylist7 "android.app.admin.IDeviceAdminService",
8 "android.app.admin.IDevicePolicyManager",
9 "android.app.backup.IBackupManager",
10 "android.app.backup.IBackupManagerMonitor",
11 "android.app.backup.IBackupObserver",
12 "android.app.backup.IFullBackupRestoreObserver",
13 "android.app.backup.IRestoreObserver",
14 "android.app.backup.IRestoreSession",
15 "android.app.backup.ISelectBackupTransportCallback",
16 "android.app.IActivityController",
[all …]
/system/sepolicy/private/
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
2 # Entered either by the app itself exec-ing the binary, or through
20 # app. The necessary MAC permissions for profiling are more maintainable and
21 # consistent if simpleperf is marked as an app domain as well (as, for example,
22 # it will then see the same set of system libraries as the app).
26 # Allow ptrace attach to the target app, for reading JIT debug info (using
30 # Allow using perf_event_open syscall for profiling the target app.
33 # Allow /proc/<pid> access for the target app (for example, when trying to
38 # profiler runs as when executed by the app. The signals are used to control
39 # the profiler (which would be profiling the app that is sending the signal).
[all …]
/system/sepolicy/prebuilts/api/34.0/private/
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
2 # Entered either by the app itself exec-ing the binary, or through
20 # app. The necessary MAC permissions for profiling are more maintainable and
21 # consistent if simpleperf is marked as an app domain as well (as, for example,
22 # it will then see the same set of system libraries as the app).
26 # Allow ptrace attach to the target app, for reading JIT debug info (using
30 # Allow using perf_event_open syscall for profiling the target app.
33 # Allow /proc/<pid> access for the target app (for example, when trying to
38 # profiler runs as when executed by the app. The signals are used to control
39 # the profiler (which would be profiling the app that is sending the signal).
[all …]
/system/sepolicy/prebuilts/api/33.0/private/
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
2 # Entered either by the app itself exec-ing the binary, or through
20 # app. The necessary MAC permissions for profiling are more maintainable and
21 # consistent if simpleperf is marked as an app domain as well (as, for example,
22 # it will then see the same set of system libraries as the app).
26 # Allow ptrace attach to the target app, for reading JIT debug info (using
30 # Allow using perf_event_open syscall for profiling the target app.
33 # Allow /proc/<pid> access for the target app (for example, when trying to
38 # profiler runs as when executed by the app. The signals are used to control
39 # the profiler (which would be profiling the app that is sending the signal).
[all …]
/system/chre/platform/include/chre/platform/
Dmemory_manager.h48 void *nanoappAlloc(Nanoapp *app, uint32_t bytes);
56 void nanoappFree(Nanoapp *app, void *ptr);
64 uint32_t nanoappFreeAll(Nanoapp *app);
131 void *doAlloc(Nanoapp *app, uint32_t size);
138 void doFree(Nanoapp *app, void *ptr);
/system/chre/platform/freertos/
Dmemory_manager.cc23 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument
24 if (app->isTcmApp()) { in doAlloc()
31 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument
32 if (app->isTcmApp()) { in doFree()
/system/chre/platform/slpi/
Dmemory_manager.cc24 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument
25 if (app->isUimgApp()) { in doAlloc()
32 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument
33 if (app->isUimgApp()) { in doFree()
/system/sepolicy/prebuilts/api/30.0/private/
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
2 # Entered either by the app itself exec-ing the binary, or through
11 # app. The necessary MAC permissions for profiling are more maintainable and
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
17 # Allow ptrace attach to the target app, for reading JIT debug info (using
21 # Allow using perf_event_open syscall for profiling the target app.
24 # Allow /proc/<pid> access for the target app (for example, when trying to
36 # Profiling must be confined to the scope of an individual app.
/system/sepolicy/prebuilts/api/32.0/private/
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
2 # Entered either by the app itself exec-ing the binary, or through
11 # app. The necessary MAC permissions for profiling are more maintainable and
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
17 # Allow ptrace attach to the target app, for reading JIT debug info (using
21 # Allow using perf_event_open syscall for profiling the target app.
24 # Allow /proc/<pid> access for the target app (for example, when trying to
36 # Profiling must be confined to the scope of an individual app.
/system/sepolicy/prebuilts/api/31.0/private/
Dsimpleperf.te1 # Domain used when running /system/bin/simpleperf to profile a specific app.
2 # Entered either by the app itself exec-ing the binary, or through
11 # app. The necessary MAC permissions for profiling are more maintainable and
12 # consistent if simpleperf is marked as an app domain as well (as, for example,
13 # it will then see the same set of system libraries as the app).
17 # Allow ptrace attach to the target app, for reading JIT debug info (using
21 # Allow using perf_event_open syscall for profiling the target app.
24 # Allow /proc/<pid> access for the target app (for example, when trying to
36 # Profiling must be confined to the scope of an individual app.

12345678910>>...30